Use authorization plugin Details Use authorization plugin to manage access to Docker daemon. Rationale: Dockers out-of-the-box authorization model is all or nothing. Any...
Use Docker’s secret management commands for managing secrets in a Swarm cluster Details Use Docker’s in-built secret management command. Rationale: Docker has variouscommands for managing secrets in a Swarm cluster. This is...
Verify SELinux security options, if applicable Details SELinux is an effective and easy-to-use Linux application security system. It is available on quite a few Linux distributions...